Behavioral task
behavioral1
Sample
1028-65-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1028-65-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1028-65-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
ccded0dce1a0854e426380643db299f1
-
SHA1
a85f25791e8cd0fe78261e4b86aae32666ebd8c7
-
SHA256
35ba709cc094ac77308743b2696edff2ea2168eb1ce1b06082e7163ca77a3b91
-
SHA512
35b85ff68a692624a8b4a47db0733117b8e27d69bfc662a3c9e57a2c25e11e8d344768bbf99f7e9215aa8b9ddca798f08f7afabb5b916f67ea05d2f0f86d9163
-
SSDEEP
3072:Lyo4GztYXNTca1/pTa9WN0mkZbIWUV0zuAmCL6/mA5/7:WWSTtxam09PzufCL6Oe/
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
wEqaPpm7 - Email To:
[email protected]
Signatures
-
Agenttesla family
Files
-
1028-65-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ